Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Classes of Quadratic APN Binomials Inequivalent to Power Functions., , and . IEEE Trans. Information Theory, 54 (9): 4218-4229 (2008)New Lightweight DES Variants., , , and . FSE, volume 4593 of Lecture Notes in Computer Science, page 196-210. Springer, (2007)On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes., , , , , , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 327-343. Springer, (2005)Observations on the SIMON Block Cipher Family., , and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 161-185. Springer, (2015)Bounds in Shallows and in Miseries., , and . CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, page 204-221. Springer, (2013)Block Ciphers - Focus on the Linear Layer (feat. PRIDE)., , , , , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 57-76. Springer, (2014)Hash Functions and RFID Tags: Mind the Gap., , , , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 283-299. Springer, (2008)SPONGENT: The Design Space of Lightweight Cryptographic Hashing., , , , , and . IEEE Trans. Computers, 62 (10): 2041-2053 (2013)Weak-Key Subspace Trails and Applications to AES., , , , and . IACR Cryptology ePrint Archive, (2019)Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions., , , and . IACR Cryptology ePrint Archive, (2018)